GitHub user rob-close opened a pull request:

    https://github.com/apache/cordova-plugin-file/pull/102

    CB-8554 Updated source to pass Fortify scan.

    From Fortify:
    Access Control: SecurityManager Bypass (Security Features, Structural)
    Poor Error Handling: Empty Catch Block (Errors, Structural)
    Poor Style: Non-final Public Static Field (Encapsulation, Structural)
    Poor Error Handling: Throw Inside Finally (Errors, Structural)
    
    And from SonarQube:
    Preserve Stack Trace
    Reliance on default encoding

You can merge this pull request into a Git repository by running:

    $ git pull https://github.com/rob-close/cordova-plugin-file CB-8554

Alternatively you can review and apply these changes as the patch at:

    https://github.com/apache/cordova-plugin-file/pull/102.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

    This closes #102
    
----
commit 05d767a31f2ae9ae380b55cbdcf8d6b675f90f33
Author: Rob Close <rob-close>
Date:   2015-02-26T19:30:48Z

    CB-8554 Updated source to pass Fortify scan.
    
    From Fortify:
    Access Control: SecurityManager Bypass (Security Features, Structural)
    Poor Error Handling: Empty Catch Block (Errors, Structural)
    Poor Style: Non-final Public Static Field (Encapsulation, Structural)
    Poor Error Handling: Throw Inside Finally (Errors, Structural)
    
    And from SonarQube:
    Preserve Stack Trace
    Reliance on default encoding

----


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastruct...@apache.org or file a JIRA ticket
with INFRA.
---

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@cordova.apache.org
For additional commands, e-mail: dev-h...@cordova.apache.org

Reply via email to